Cyber Insurance Claims Data Shows Criminals Shift To Data Theft And Long-Tail Damage

Estimated reading time: 7 minutes

Resilience’s 2025 cyber insurance claims data shows that ransomware groups are now focusing on stealing data to gain leverage. Data-suppression extortion rose from 49% in the first half of the year to 65% in the second half. In 57% of attacks, criminals used data theft to get around stronger backups. Infostealers collected over two billion credentials and often signaled a breach before ransomware attacks. Interlock looked for stolen files in cyber insurance policies and changed their demands based on coverage limits. Vendor failures caused 18% of losses as attackers took advantage of password resets and compromised open-source repositories. This shift shapes the rest of the report, which explains how these tactics are changing loss drivers, response costs, and coverage choices.

“Cyber risk is constantly changing. As cybercriminals shift their tactics, a new reality is setting in: the real risk is about more than a security incident’s immediate disruption, it’s about the long-tail aftershocks that follow,” said Vishaal “V8” Hariprasad, Co-Founder and CEO of Resilience.

Resilience logo used in cyber insurance claims report and press release.
Extortion Moves From Encryption To Data Exposure

Resilience reports that attackers now seek longer-lasting leverage. The report describes a shift from using encryption to disrupt operations to using data theft for reputational pressure. The data backs this up: attacks involving only data theft made up 49% of extortion claims in the first half of the year and increased to 65% in the second half.

A chart in the report shows the breakdown for the year: data theft without encryption was the most common at 57.6%, followed by attacks with both encryption and theft at 29.4%, and encryption alone at 13%.

Resilience 2025 Cyber Risk Report

Resilience connects this trend to better backups and recovery methods. Attackers now often avoid complex encryption tools. Instead, they steal data and threaten to release it. The report says this approach takes away “recovery-focused” options for victims.

Resilience CEO Vishaal “V8” Hariprasad framed the stakes in the press release. “Claims data gives us the best and most granular insight,” he said. He highlighted “the long-tail aftershocks that follow.”

Claims Severity Follows Regulation, Reputation, And Litigation

The report warns that exposing data can lead to costs that last for years. It points out the legal, regulatory, and reputational effects that follow an incident. This ongoing impact is called the “tail” of a cyber event.

See also  The Grand Jury Says: Get Cyber Insurance

Resilience Chief Underwriting Officer Maria Long described the payment trap. “Paying for data suppression has proven unsuccessful,” she said. She noted lawsuits often follow even after payment.

The report also notes an increase in privacy-related disputes. Notices about wrongful data collection more than doubled from 2024 to 2025. Lawsuits focused on website tracking and data sharing. Many of these claims were covered by self-insured retentions.

Phishing Jumps To The Top Failure Point

Resilience tracked how attackers first got access. In 2025, phishing was the main cause of failure, leading to 50% of losses, up from 22% in 2024.

Resilience 2025 Cyber Risk Report

The report links this increase to social engineering boosted by AI. It references research showing that AI-driven spearphishing had a 54% success rate, while traditional phishing had a 12% success rate in the same study.

Resilience notes that training still makes a financial difference. They estimate that companies with training lowered their potential risk by over $100,000. Better wire controls reduced overall risk by an average of $795,000.

Vendor Risk Stays A Major Loss Driver

Vendor issues were the second biggest cause of losses. Vendor-related failures dropped from 22% in 2024 to 18.8% in 2025. However, Resilience still reports that outages can be very severe.

The report breaks vendor risk into three types: ransomware at a vendor that disrupts clients, vendor breaches that expose client data, and non-malicious outages that still have a real business impact.

Resilience Global Head of Claims Jeremy Gittler offered a blunt summary. “You can outsource your services, but you cannot outsource your risk.”

Identity Becomes The New Perimeter

Resilience researchers see infostealers as an important warning sign. They report that infostealers collected two billion credentials in the first half of 2025 and often showed up before ransomware attacks.

The report urges quick action if there are signs of infostealer activity. It treats credential compromise as an early warning and recommends rotating tokens and assuming a breach if exposure is found.

See also  Upstream Report Flags Remote Attack Growth As HSB Adds Fleet Cyber Coverage

The press release also stresses the need to act quickly. Resilience ROC leader Judson Dressler describes cyber risk as “an ‘everything, everywhere, all at once’ model.” He says the team looks for stolen credentials and warns clients.

Get The Cyber Insurance News Upload Delivered
Subscribe to our newsletter!

Threat Groups Professionalize Ransom Pricing

Resilience reports that a few groups caused most of the severe losses. A chart ranks ransomware gangs by their share of losses: Chaos led with 35.3%, followed by Interlock at 27.0%.

Resilience 2025 Cyber Risk Report

Resilience points out Interlock’s use of “policy reconnaissance.” The group looks for insurance policies in stolen data. The report says attackers adjust their demands to stay under coverage limits, which puts cyber insurance data at risk.

Scattered Spider also had a big impact in 2025. Resilience connects this group to attacks on retail companies. In one case, the report notes losses of over £40 million per week.

Industry Losses Concentrate In Three Sectors

Resilience reports that manufacturing, healthcare, and retail made up 68% of total losses. Each sector faced its own unique challenges.

Manufacturing had the highest total losses, making up almost 30% of the total. The report links this to just-in-time operations and complex operational technology. Healthcare had the most severe incidents, with costs tied to sensitive records and regulatory requirements. Retail, which had almost no losses in 2024, moved to the highest severity tier in 2025.

Case studies highlight these trends. In one retail case, losses grew quickly because of a vendor outage. In a healthcare claim, almost two-thirds of the budget went to legal costs and reviewing data.

What The Report Urges For 2026 Planning

Resilience expects extortion-only attacks to become more common in 2026. The report predicts more deepfake abuse, quicker identity compromise, and lawsuits following most incidents within days.

The report’s advice is aimed at business leaders. CFOs are encouraged to invest more in prevention controls instead of just backups. CROs should assess tail risk and vendor dependency. CISOs should focus on data loss prevention and stronger authentication against phishing.

See also  AI Cybersecurity Threats: A Dominating Force in Arelion's Latest Report

For those buying cyber insurance, the main message is to focus on realistic coverage limits. The report recommends choosing coverage that matches the severity seen in 2025, rather than relying on older averages.

FAQ Summary
What Does The Resilience Report Analyze?

It analyzes Resilience claims and ROC research from 2025, with 2024 comparisons.

What Changed In Ransomware Tactics During 2025?

Attackers shifted toward data theft-only extortion instead of encryption.

How Fast Did Data Theft-Only Attacks Grow?

They rose from 49% of extortion claims in H1 to 65% in H2.

What Was The Full-Year Mix Of Extortion Methods?

Data theft-only led at 57.6%, with 29.4% using both methods.

What Was The Top Point Of Failure In 2025?

Phishing drove 50% of incurred losses, up sharply from 2024.

Why Does The Report Emphasize Identity Risk?

Infostealers harvested billions of credentials and often appeared before major attacks.

How Important Was Vendor Risk In The Data?

Vendor-related failures remained the second-highest loss category at 18.8%.

Which Threat Actors Drove The Highest Losses?

The report highlights groups like Chaos and Interlock by incurred loss share.

Which Industries Saw The Most Losses?

Manufacturing, healthcare, and retail accounted for 68% of portfolio losses.

What Actions Does Resilience Recommend For 2026 Readiness?

It recommends prevention controls, vendor contingency plans, and coverage aligned to 2025 severity.

Leave a Comment

×